mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/05/26 00:11:58
This commit is contained in:
parent
a35c833856
commit
8fca9a2782
29 changed files with 138 additions and 110 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-24T06:20:18Z",
|
||||
"updated_at": "2021-05-25T09:16:10Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1035,
|
||||
"watchers_count": 1035,
|
||||
"stargazers_count": 1034,
|
||||
"watchers_count": 1034,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1035,
|
||||
"watchers": 1034,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-24T06:20:18Z",
|
||||
"updated_at": "2021-05-25T09:16:10Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1035,
|
||||
"watchers_count": 1035,
|
||||
"stargazers_count": 1034,
|
||||
"watchers_count": 1034,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1035,
|
||||
"watchers": 1034,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-24T06:20:18Z",
|
||||
"updated_at": "2021-05-25T09:16:10Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1035,
|
||||
"watchers_count": 1035,
|
||||
"stargazers_count": 1034,
|
||||
"watchers_count": 1034,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1035,
|
||||
"watchers": 1034,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"forks_count": 400,
|
||||
"forks": 400,
|
||||
"forks_count": 401,
|
||||
"forks": 401,
|
||||
"watchers": 421,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-24T06:20:18Z",
|
||||
"updated_at": "2021-05-25T09:16:10Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1035,
|
||||
"watchers_count": 1035,
|
||||
"stargazers_count": 1034,
|
||||
"watchers_count": 1034,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1035,
|
||||
"watchers": 1034,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-05-23T02:07:57Z",
|
||||
"updated_at": "2021-05-25T10:21:05Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 422,
|
||||
"watchers": 421,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1232,13 +1232,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2021-05-25T08:17:48Z",
|
||||
"updated_at": "2021-05-25T09:41:45Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 812,
|
||||
"watchers_count": 812,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 812,
|
||||
"stargazers_count": 813,
|
||||
"watchers_count": 813,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 813,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-05-25T00:44:14Z",
|
||||
"updated_at": "2021-05-25T14:19:03Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1655,
|
||||
"watchers_count": 1655,
|
||||
"stargazers_count": 1656,
|
||||
"watchers_count": 1656,
|
||||
"forks_count": 251,
|
||||
"forks": 251,
|
||||
"watchers": 1655,
|
||||
"watchers": 1656,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2021-05-04T05:37:05Z",
|
||||
"updated_at": "2021-05-25T12:40:37Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 254,
|
||||
"watchers": 255,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Directory transversal to remote code execution",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T03:40:13Z",
|
||||
"updated_at": "2021-03-21T12:56:28Z",
|
||||
"updated_at": "2021-05-25T10:21:04Z",
|
||||
"pushed_at": "2019-10-15T03:53:55Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 68,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2021-05-14T02:58:17Z",
|
||||
"updated_at": "2021-05-25T14:12:11Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 764,
|
||||
"watchers_count": 764,
|
||||
"stargazers_count": 763,
|
||||
"watchers_count": 763,
|
||||
"forks_count": 160,
|
||||
"forks": 160,
|
||||
"watchers": 764,
|
||||
"watchers": 763,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-24T06:20:18Z",
|
||||
"updated_at": "2021-05-25T09:16:10Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1035,
|
||||
"watchers_count": 1035,
|
||||
"stargazers_count": 1034,
|
||||
"watchers_count": 1034,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1035,
|
||||
"watchers": 1034,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-05T17:19:02Z",
|
||||
"updated_at": "2021-05-21T18:35:49Z",
|
||||
"updated_at": "2021-05-25T09:38:10Z",
|
||||
"pushed_at": "2019-12-28T18:25:10Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 206,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 162,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1439,13 +1439,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T01:48:37Z",
|
||||
"updated_at": "2021-05-14T12:56:07Z",
|
||||
"updated_at": "2021-05-25T09:56:38Z",
|
||||
"pushed_at": "2020-09-17T01:55:48Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"forks_count": 240,
|
||||
"forks": 240,
|
||||
"forks_count": 241,
|
||||
"forks": 241,
|
||||
"watchers": 765,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2021-05-22T09:54:20Z",
|
||||
"updated_at": "2021-05-25T11:48:04Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 192,
|
||||
"watchers": 193,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-05-24T06:20:18Z",
|
||||
"updated_at": "2021-05-25T09:16:10Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1035,
|
||||
"watchers_count": 1035,
|
||||
"stargazers_count": 1034,
|
||||
"watchers_count": 1034,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1035,
|
||||
"watchers": 1034,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-05-17T05:49:12Z",
|
||||
"pushed_at": "2021-04-20T08:35:26Z",
|
||||
"updated_at": "2021-05-25T11:14:58Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 23,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2020–7961 Mass exploit for Script Kiddies",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-02T13:57:59Z",
|
||||
"updated_at": "2021-05-21T00:55:24Z",
|
||||
"updated_at": "2021-05-25T10:13:00Z",
|
||||
"pushed_at": "2021-01-03T10:54:20Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-27T07:09:46Z",
|
||||
"updated_at": "2021-05-17T04:51:22Z",
|
||||
"updated_at": "2021-05-25T14:52:51Z",
|
||||
"pushed_at": "2021-05-02T05:34:29Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T18:45:07Z",
|
||||
"updated_at": "2021-05-25T07:41:26Z",
|
||||
"updated_at": "2021-05-25T10:19:24Z",
|
||||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-05-17T05:49:12Z",
|
||||
"pushed_at": "2021-04-20T08:35:26Z",
|
||||
"updated_at": "2021-05-25T11:14:58Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 23,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2021-05-24T06:48:53Z",
|
||||
"updated_at": "2021-05-25T09:39:14Z",
|
||||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"forks_count": 240,
|
||||
"forks": 240,
|
||||
"forks_count": 241,
|
||||
"forks": 241,
|
||||
"watchers": 765,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2021-05-25T08:48:21Z",
|
||||
"updated_at": "2021-05-25T14:18:34Z",
|
||||
"pushed_at": "2021-05-21T23:58:50Z",
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"stargazers_count": 696,
|
||||
"watchers_count": 696,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"watchers": 695,
|
||||
"watchers": 696,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T08:42:28Z",
|
||||
"updated_at": "2021-05-24T03:27:37Z",
|
||||
"updated_at": "2021-05-25T12:59:19Z",
|
||||
"pushed_at": "2021-01-25T08:49:59Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2021-01-27T06:23:34Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2021-02-18T08:30:23Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2021/CVE-2021-33558.json
Normal file
25
2021/CVE-2021-33558.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 370638345,
|
||||
"name": "CVE-2021-33558.",
|
||||
"full_name": "mdanzaruddin\/CVE-2021-33558.",
|
||||
"owner": {
|
||||
"login": "mdanzaruddin",
|
||||
"id": 48306735,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48306735?v=4",
|
||||
"html_url": "https:\/\/github.com\/mdanzaruddin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mdanzaruddin\/CVE-2021-33558.",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T09:33:21Z",
|
||||
"updated_at": "2021-05-25T09:42:03Z",
|
||||
"pushed_at": "2021-05-25T09:42:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1160,6 +1160,9 @@ Insufficient input validation in the Marvin Minsky 1967 implementation of the Un
|
|||
|
||||
- [intrinsic-propensity/turing-machine](https://github.com/intrinsic-propensity/turing-machine)
|
||||
|
||||
### CVE-2021-33558
|
||||
- [mdanzaruddin/CVE-2021-33558.](https://github.com/mdanzaruddin/CVE-2021-33558.)
|
||||
|
||||
### CVE-2021-3222222
|
||||
- [r90tpass/CVE-2021-3222222](https://github.com/r90tpass/CVE-2021-3222222)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue